General

  • Target

    7f420bd86a916991cf76f89256da0dec18aadd2586f70fcaea583e0c18337ac5

  • Size

    9.6MB

  • Sample

    241216-dl7lps1lgs

  • MD5

    e307d91f3e0effe5c2ec8a8d665ec5ad

  • SHA1

    a68513bf36da7cd8681399e09765bee474c51c60

  • SHA256

    7f420bd86a916991cf76f89256da0dec18aadd2586f70fcaea583e0c18337ac5

  • SHA512

    1bd850d0b5ba87ee6f18c5134a590460edf9f3a595a39a13c9f5440c4270349fbbd57a6e55d95d3e98abbe370c6a0605ddaa720171e0e144fce634cc9927b550

  • SSDEEP

    196608:VbHkvEAQ5iAeKQEx+/tCj/xQVTvv95Gq0xRq7tc1lM12:5HkvEhzeKQ/tCFQVTH90q0xRnD

Malware Config

Extracted

Family

octo

AES_key
AES_key

Targets

    • Target

      7f420bd86a916991cf76f89256da0dec18aadd2586f70fcaea583e0c18337ac5

    • Size

      9.6MB

    • MD5

      e307d91f3e0effe5c2ec8a8d665ec5ad

    • SHA1

      a68513bf36da7cd8681399e09765bee474c51c60

    • SHA256

      7f420bd86a916991cf76f89256da0dec18aadd2586f70fcaea583e0c18337ac5

    • SHA512

      1bd850d0b5ba87ee6f18c5134a590460edf9f3a595a39a13c9f5440c4270349fbbd57a6e55d95d3e98abbe370c6a0605ddaa720171e0e144fce634cc9927b550

    • SSDEEP

      196608:VbHkvEAQ5iAeKQEx+/tCj/xQVTvv95Gq0xRq7tc1lM12:5HkvEhzeKQ/tCFQVTH90q0xRnD

    • Target

      base.apk

    • Size

      7.9MB

    • MD5

      f0118ab978d8f576fe236b9be190a7cd

    • SHA1

      28b12f541a40874bb042e4a51d6afde3aaaad21e

    • SHA256

      8514cb79f28e5cc964fad0ca69265b370d2b67d4cbb170bc5fd64baea2a30e2a

    • SHA512

      b8f91b6bbba1ee60ebd904719b4f0a396f73c691b8915a03f228e74b22e013920518a28b1964c6b55f5398b1f6cbef9d1feb9393308b300c04fbf25584f2d779

    • SSDEEP

      98304:EIKgO/AEtIYdaOnFYaVKxnKp7Wj7b5iSRGPa8RsVrnA5YVBvl5VJBkMD:9Oxt9YaUJqKj7brMRqGuBvl/

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks